CCSP 2019: Secure Cloud Computing
CCSP 2019
| Intermediate
- 17 videos | 1h 21m 1s
- Includes Assessment
- Earns a Badge
Explore security solutions related to securing cloud-based IT systems and data including jump boxes and firewalls in this 13-video course. Discover how disaster recovery concepts such as RTO (recovery time objective) and RPO (recovery point objective) apply to the cloud. This course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Examine Internal Information Security Management and Security Control Systems, cryptography, and encryption of cloud-hosted assets. Learn about access control for cloud-hosted assets, asset removal, and storage media sanitization. Explore cloud network security issues and solutions such as firewall access control lists (ACLs). Learn how a jump box limits direct cloud virtual machine access. Capture traffic in a Microsoft Azure cloud computing environment, and deploy a Microsoft Azure Firewall. Look at security in virtualized environments, including infrastructure and data threats and platform-specific security responsibilities. Examine the security-based lifecycle of cloud-hosted assets and business continuity and disaster recovery concepts such as RTO and RPO and cloud functional security. Finally, learners view methodologies for mapping cloud service requirements to service provider certification and product certifications.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the deployment of Internal Information Security Management and Security Control Systemsdescribe the encryption of cloud-hosted assetsdescribe access and access control for cloud-hosted assets like data, files, and resourcesoutline asset and media management with respect to deletion, removal, and overwrite on a cloud platformdefine issues and solutions relating to cloud network structuresdeploy a jump box to limit direct cloud virtual machine accesscapture traffic in a Microsoft Azure cloud computing environmentdeploy a Microsoft Azure Firewall
-
define issues and solutions relating to cloud virtualization infrastructures including hypervisor security and container securitylist and describe known and common threats to cloud infrastructure and data assetsdefine security responsibilities on a per cloud modeldescribe the security-based data life cycle of cloud-hosted assets like data, files, and featuresdescribe business continuity and disaster recovery as it applies to a cloud service, RTO, RPO, RLO, and RSLdescribe focus areas relating to the functional security of the cloud service including vendor lock-in, interoperability, portability, migration, etc. as per (ISO/IEC) 27017describe methodologies for mapping cloud service requirements to service provider certification and product certificationssummarize the key concepts covered in this course
IN THIS COURSE
-
2m 27s
-
4m 8s
-
5m 20s
-
4m 54s
-
3m 25s
-
5m 18s
-
5m 22s
-
3m 2s
-
7m 56s
-
6m 25s
-
4m 21s
-
5m 27s
-
4m 1s
-
8m 10s
-
3m 14s
-
6m 22s
-
1m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.